Tagged Questions

Not sure this is the right stack to ask this in, it's kind of an abstract question.
Say you have a website where it is very important that the personal information provided by the users is authentic. ...

I have a back-end (API) and a front-end, eg a web server, and I have users and ID-providers.
The web server is provided by a third aprty and it may just as well be a mobile app, but whatever the case ...

When an average person sees an email, he can see only part of an information enclosed in the mail. To see full information one can look at the source of an email, which shows more. Example of an email ...

I've been dealing with two separate banks for completing a 401k rollover (I do not have any other accounts with either of the two banks), and I've encountered something with both that I've never seen ...

I'm just wondering if there is any way to uniquely identify or tag client devices like laptops and towers in order to whitelist them for vpn access.
(Note: This is a thought-experiment at the moment, ...

Several times I get a phone call from a company- my bank, utility companies etc. Many times they are just cold calling me, but once or twice they were calling for legitimate reasons (ie, something to ...

How can one identify a service running on a non-standard port? I'm not talking about services like webserver or FTP since nmap can do that without any problems. I'm talking about services that are not ...

I am always confused by the way the word authentication is used in security literature (i.e., outside the crypto realm). Most of the time I understand that they are actually implying identification.
...